Archive Search Articles

F5 Year In Review

by: Drew Milam

As December brings 2017 to a close, it also marks an opportunity to be retrospective and look back on the year that was. This past month, we’ve been highlighting some of our blog posts, security research, reports, F5 Labs threat intelligence, and...

Combat Commodified Attacks with Managed Security Services

by: Lee Slaughter

Anyone with access to a computer can point a DDoS-for-hire push button tool anywhere they want for just a few bucks. The sophistication is low and the accessibility is high, meaning the frequency of these attacks is primed to increase.

Three Things App Security is Not

by: Lori MacVittie

App security is a lot of things, but sometimes we need to stop and consider what it isn’t, particularly as the volume and frequency of applications developed and deployed to meet the insatiable demand continues to rise. 1. Not a high priority A...

Nearly Half of Orgs Hit by Smokescreen DDoS Attacks

by: Lori MacVittie

Information security is rife with military terminology. That’s unsurprising, given the abstract relationship between the opposing forces; one trying to attack while the other defends. Modern DDoS attacks are surprisingly simplistic, in strategy at...